[Ilugc] Re: [OT] DNS sec issue affects home users

  • From: mohan34u@xxxxxxxxx (Mohan R)
  • Date: Sat Jul 26 14:57:44 2008

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I am using BSNL-chennai broadband, this is the output when I checked
with http://www.doxpara.com/.

Output:

Your name server, at 218.248.255.146, appears vulnerable to DNS Cache
Poisoning.
All requests came from the following source port: 50741

Due to events outside our control, details of the vulnerability have
been leaked. Please consider using a safe DNS server, such as OpenDNS.
Note: Comcast users should not worry.Requests seen for
d366ec6f3360.toorrr.com:
218.248.255.146:50741 TXID=44463
218.248.255.146:50741 TXID=45175
218.248.255.146:50741 TXID=56507
218.248.255.146:50741 TXID=62803
218.248.255.146:50741 TXID=64546

Always,
Mohan.

Kapil Hari Paranjape wrote:

Hello,

Here is a nice write up by Dan Kaminsky himself.

 http://www.doxpara.com/?p=1176

Kapil.
--

_______________________________________________
To unsubscribe, email ilugc-request@xxxxxxxxxxxxx with 
"unsubscribe <password> <address>"
in the subject or body of the message.  
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIiu36t9uhryeRrzIRAqGTAKCGtJiv1XzsMW3v/fy+fSx/OejB8gCgjpZj
k8GdA6AG5yRvpZdUmUeiwHk=
=5nSK
-----END PGP SIGNATURE-----

Other related posts: